1. Akerlof GA, Shiller RJ (2015) Phishing for phools. Princeton University Press, Princeton
2. Andrade R, Torres J, Cadena S (2019) Cognitive security for incident management process. In: International conference on information technology & systems. Springer, Berlin, pp 612–621
3. Arons B (1992) A review of the cocktail party effect. J Am Voice I/O Soc 12(7):35–50
4. Barmer H, Dzombak R, Gaston M, Palat V, Redner F, Smith T, et al (2021) Scalable AI. Tech. rep., Carnegie Mellon University. https://doi.org/10.1184/R1/16560273.v1
5. Bereiter-Hahn J, Strohmeier R, Kunzenbacher I, Beck K, Voth M (1981) Locomotion of xenopus epidermis cells in primary culture. J Cell Sci 52(1):289–311